//

Blog

How digital forensic investigations can help businesses respond to employee theft

How digital forensic investigations can help businesses respond to employee theft   It’s estimated that intellectual property (IP) accounts for more than 80% of the value of publicly traded companies. From trade secrets and confidential corporate strategies to sensitive technology diagrams and customer databases, this information is what keeps the […]

read more

A Quick Guide to Workplace Investigations

A Quick Guide to Workplace Investigations Cyber security breaches stemming from insider threats have increased consistently over the last few years. While companies seek to hire the best, brightest, and most ethical people to help make their business a success, things don’t always go as planned. Circumstances change, motivations transform, […]

read more
Blog, Data Breach, Incident Response | on March 31, 2020

Kwampirs Malware targeting Global Industries

Kwampirs Malware targeting Global Industries Including the Healthcare Sector, Supply Chain, Financial Institutions, and prominent Law firms. The Federal Bureau of Investigation (FBI) has sent a security alert to the U.S. private sector about an ongoing attack against the healthcare sector, supply chain software vendors, financial institutions and prominent law […]

read more

Addressing Employee Data Theft in your Organization

Addressing Employee Data Theft in your Organization Almost a decade ago, Jason Needham left his job at an engineering firm to start his own company. After resigning, through virtual backdoors and unauthorized accounts, Jason was able to continue accessing his former employee’s data and systems. Over two years after leaving […]

read more
Blog, Data Breach, Incident Response | on March 3, 2020

When a file acts as a double agent and how to address it

When a file acts as a double agent and how to address it Incident response is a critical security and business function required to keep the integrity of any company in check. How a company reacts when the pressure is on could potentially make or break the financial fallout of […]

read more
Blog, Digital Forensics | on January 30, 2020

Future of Automation in Digital Forensics

Techno Security & Digital Forensics Conference 2018 program featured 67 sessions led by 64 industry experts organized under the primary tracks of Audit/Risk Management, Forensics, Investigations, Information Security, and Sponsor Demos. Session topics included Password Cracking, Digital Evidence from Social Networking, Apple File Systems, Dark Web Investigations, Windows PowerShell, Drone […]

read more
Blog, General | on January 16, 2020

Password Spraying – Explained

Password spraying is an attack that attempts to access a large number of accounts with a few commonly used passwords while brute-force attacks attempt to gain unauthorized access to a single account by guessing the password. In this video Cyber Centaurs show how password spraying works.

read more
Blog | on December 20, 2019

2020 Cybersecurity Forecast

Despite a considerable strengthening of cyber defenses undertaken in the recent past, vulnerabilities do exist and need to be promptly addressed, especially those of legacy IT systems and access control loopholes. 2020 Cybersecurity Predictions Cybersecurity predictions include the upcoming elections in the USA, more targeted ransomware,, new attack vectors, more […]

read more
Blog, eDiscovery | on December 7, 2019

What is eDiscovery?

Electronic discovery (sometimes known as e-discovery, ediscovery, eDiscovery, or e-Discovery) is the electronic aspect of identifying, collecting and producing electronically stored information (ESI) in response to a request for production in a law suit or investigation. ESI includes, but is not limited to, emails, documents, presentations, databases, voicemail, audio and […]

read more